Nginx Ingress Alerts
Sumo Logic has provided out-of-the-box alerts available via Sumo Logic monitors to help you quickly determine if the Nginx server is available and performing as expected. These alerts are built based on logs and metrics datasets and have preset thresholds based on industry best practices and recommendations.
Sumo Logic provides the following out-of-the-box alerts:
Alert Type (Metrics/Logs) | Alert Name | Alert Description | Trigger Type (Critical / Warning) | Alert Condition | Recover Condition |
---|---|---|---|---|---|
Logs |
Nginx Ingress - Access from Highly Malicious Sources |
This alert fires when an Nginx Ingress server is accessed from highly malicious IP addresses. |
Critical | > 0 | <= 0 |
Logs |
Nginx Ingress - High Client (HTTP 4xx) Error Rate |
This alert fires when there are too many HTTP requests (>5%) with a response status of 4xx. |
Critical | > 0 | 0 |
Logs |
Nginx Ingress - High Server (HTTP 5xx) Error Rate |
This alert fires when there are too many HTTP requests (>5%) with a response status of 5xx. |
Critical | > 0 | 0 |
Logs |
Nginx Ingress - Critical Error Messages |
This alert fires when we detect critical error messages for a given Nginx Ingress server. |
Critical | > 0 | 0 |
Metrics |
Nginx Ingress - Dropped Connections |
This alert fires when we detect dropped connections for a given Nginx Ingress server. |
Critical | > 0 | 0 |